Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volu...
详细信息
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volume of content that CQAs *** clarify the current state of the CQA literature that has used ML and DL,this paper reports a systematic literature *** goal is to summarise and synthesise the major themes of CQA research related to(i)questions,(ii)answers and(iii)*** final review included 133 *** research themes include question quality,answer quality,and expert *** terms of dataset,some of the most widely studied platforms include Yahoo!Answers,Stack Exchange and Stack *** scope of most articles was confined to just one platform with few cross-platform *** with ML outnumber those with ***,the use of DL in CQA research is on an upward trajectory.A number of research directions are proposed.
Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote *** has several advantages,including increas...
详细信息
Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote *** has several advantages,including increased battery life,lower latency,and better application performance.A task offloading method determines whether sections of the full application should be run locally or offloaded for execution *** offloading choice problem is influenced by several factors,including application properties,network conditions,hardware features,and mobility,influencing the offloading system’s operational *** study provides a thorough examination of current task offloading and resource allocation in edge computing,covering offloading strategies,algorithms,and factors that influence *** offloading and partial offloading strategies are the two types of offloading *** algorithms for task offloading and resource allocation are then categorized into two parts:machine learning algorithms and non-machine learning *** examine and elaborate on algorithms like Supervised Learning,Unsupervised Learning,and Reinforcement Learning(RL)under machine *** the non-machine learning algorithm,we elaborate on algorithms like non(convex)optimization,Lyapunov optimization,Game theory,Heuristic Algorithm,Dynamic Voltage Scaling,Gibbs Sampling,and Generalized Benders Decomposition(GBD).Finally,we highlight and discuss some research challenges and issues in edge computing.
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
Robot calligraphy visually reflects the motion capability of robotic *** traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article presents a gen...
详细信息
Robot calligraphy visually reflects the motion capability of robotic *** traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article presents a generative adversarial network(GAN)-based motion learning method for robotic calligraphy synthesis(Gan2CS)that can enhance the efficiency in writing complex calligraphy words and reproducing classic calligraphy *** key technologies in the proposed approach include:(1)adopting the GAN to learn the motion parameters from the robot writing operation;(2)converting the learnt motion data into the style font and realising the transition from static calligraphy images to dynamic writing demonstration;(3)reproducing high-precision calligraphy works by synthesising the writing motion data *** this study,the motion trajectories of sample calligraphy images are firstly extracted and converted into the robot *** robot performs the writing with motion planning,and the writing motion parameters of calligraphy strokes are learnt with *** the motion data of basic strokes is synthesised based on the hierarchical process of‘stroke-radicalpart-character’.And the robot re-writes the synthesised characters whose similarity with the original calligraphy characters is *** calligraphy characters have been tested in the experiments for method validation and the results validated that the robot can actualise the robotic calligraphy synthesis of writing motion data with GAN.
Federated Class-Incremental Learning (FCIL) aims to design privacy-preserving collaborative training methods to continuously learn new classes from distributed datasets. In these scenarios, federated clients face the ...
详细信息
Cross-project defect prediction is a hot topic in the field of defect prediction. How to reduce the difference between projects and make the model have better accuracy is the core problem. This paper starts from two p...
详细信息
Cross-project defect prediction is a hot topic in the field of defect prediction. How to reduce the difference between projects and make the model have better accuracy is the core problem. This paper starts from two perspectives: feature selection and distance-weight instance transfer. We reduce the differences between projects from the perspective of feature engineering and introduce the transfer learning technology to construct a cross-project defect prediction model WCM-WTrA and multi-source model Multi-WCM-WTrA. We have tested on AEEEM and ReLink datasets, and the results show that our method has an average improvement of 23%compared with TCA+ algorithm on AEEEM datasets,and an average improvement of 5% on ReLink datasets.
Exhaled breath analysis has attracted considerable attention as a noninvasive and portable health diagnosis method due to numerous advantages,such as convenience,safety,simplicity,and avoidance of *** on many studies,...
详细信息
Exhaled breath analysis has attracted considerable attention as a noninvasive and portable health diagnosis method due to numerous advantages,such as convenience,safety,simplicity,and avoidance of *** on many studies,exhaled breath analysis is a promising medical detection technology capable of diagnosing different diseases by analyzing the concentration,type and other characteristics of specific *** the existing gas analysis technology,the electronic nose(eNose)analysis method has great advantages of high sensitivity,rapid response,real-time monitoring,ease of use and ***,this review is intended to provide an overview of the application of human exhaled breath components in disease diagnosis,existing breath testing technologies and the development and research status of electronic nose *** the electronic nose technology section,the three aspects of sensors,algorithms and existing systems are summarized in ***,the related challenges and limitations involved in the abovementioned technologies are also ***,the conclusion and perspective of eNose technology are presented.
Safety equipment detection is an important application of object detection, receiving widespread attention in fields such as smart construction sites and video surveillance. Significant progress has been made in objec...
详细信息
The use of Unmanned Aerial Vehicles (UAVs) as aerial base stations has attracted increasing research interest in recent years. A key challenge in this field is determining how to deploy multiple UAVs in dynamic enviro...
详细信息
暂无评论